Skip to main content

Encrypting VoLTE Communication via Baseband Firmware Extension

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

  • 1073 Accesses

Abstract

VoLTE is a technology carried on 4G network by RTP, and realizes the unification of data and voice communication. At the same time, it also faces the vulnerability of wireless communication. This paper proposes a HOOK-based method to modify the mobile phone baseband to implement end-to-end encrypted VoLTE calls. The experiment first builds a framework with assembly code, which can hook the process functions for sending and receiving packet, in order to capture the RTP data packet and inject the encryption and decryption patch function. Then through the analysis of the data packet, the key agreement and extension using the packet header is completed by C language. The automatic voice data encryption with AES 256 algorithm is realized through the library functions in the baseband. In conclusion, the experiment implements a one-time pad encryption mechanism to ensure VoLTE communication security, so that even if a third party intercepts the data packet, the information cannot be leaked.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohseni, M., Banani, S.A., Eckford, A.W., Adve, R.S.: Scheduling for VoLTE: resource allocation optimization and low-complexity algorithms. IEEE Trans. Wireless Commun. 18(3), 1534–1547 (2019)

    Article  Google Scholar 

  2. Zhang, X.Y., Gao, S.Q., Jiang, H.J.: Baseband circuit design for wireless speech acquisition transmitter based on G.726 coding. Microelectron. Comput. 35(1), 31–35, 40 (2018)

    Google Scholar 

  3. Dick, S., Volmar, D.: DLL hell: software dependencies, failure, and the maintenance of microsoft windows. IEEE Ann. Hist. Comput. 40(4), 28–51 (2018)

    Article  Google Scholar 

  4. Shin, K., Won, Y.: Study on malicious code behavior detection using windows filter driver and API call sequence. In: Park, James J., Loia, V., Yi, G., Sung, Y. (eds.) CUTE/CSA -2017. LNEE, vol. 474, pp. 938–943. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7605-3_149

    Chapter  Google Scholar 

  5. Zhan, D.Y., Ye, L., Zhang, H.L.: A high-performance virtual machine filesystem monitor in cloud-assisted cognitive loT. Futur. Gener. Comput. Syst. Int. J. Escience 88, 209–219 (2018)

    Article  Google Scholar 

  6. Natarajan, H., Diggi, S., Kanagarathinam, MR.: D-VoWiFi - a guaranteed bit rate scheduling for VoWiFi in non dedicated channel. In: 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 1–6. IEEE, Las Vegas, NV (2019)

    Google Scholar 

  7. Sung, Y.C., Ho, Y.S., Lin, Y.B.: Voice/Video quality measurement for LTE services. IEEE Wirel. Commun. 25(4), 96–103 (2018)

    Article  Google Scholar 

  8. Yang, H.J., Shi, M., Xia, Y.Q.: Security research on wireless networked control systems subject to jamming attacks. IEEE Trans. Cybern. 49(6), 2022–2031 (2019)

    Article  Google Scholar 

  9. Kim, H., Kim, D., Kwon, M.: Breaking and fixing VoLTE: exploiting hidden data channels and mis-implementations. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 328–339. Assoc Comp Machinery, Denver, CO (2015)

    Google Scholar 

  10. Zhang, X.S., Tan, Y.A., Liang, C., Li, Y.Z.: A covert channel over VoLTE via adjusting silence periods. IEEE Access 6, 9292–9302 (2018)

    Article  Google Scholar 

  11. Li, C.Y., Tu, G.H., Peng, C.Y.: Insecurity of voice solution VoLTE in LTE mobile networks. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 316–327. Assoc Comp Machinery, Denver, CO (2015)

    Google Scholar 

  12. Tu, G.H., Li, C.Y., Peng, C.Y.: How voice call technology poses security threats in 4G LTE networks. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 442–450. Springer, Florence, Italy (2015)

    Google Scholar 

  13. Fan, A.W., Wang, Q.M., Debnath, J.: A high precision data encryption algorithm in wireless network mobile communication. Discret. Continuous Dyn. Syst.-S 12(4–5), 1327–1340 (2019)

    Article  MathSciNet  Google Scholar 

  14. Kfoury, E.F., Khoury, D.J.: Secure end-to-end VoLTE based on ethereum blockchain. In: 41st International Conference on Telecommunications and Signal Processing (TSP), pp. 128–132. IEEE, Athens, Greece (2018)

    Google Scholar 

  15. Zhang, Q.X., Gong, H.X., Zhang, X.S.: A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimed. Tools Appl. 78(3), 3493–3509 (2019)

    Article  Google Scholar 

  16. Zhao, M., Jia, B., Wang, J.: Performance optimization on dynamic adaptive streaming over HTTP in multi-user MIMO LTE networks. IEEE Trans. Mob. Comput. 17(12), 2853–2867 (2018)

    Article  Google Scholar 

  17. Li, J., Hao, Z.h., Gao, Q.: Implementation of a multimedia communication system over IP network. In: IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 141–145. IEEE, Chengdu, Peoples of China (2017)

    Google Scholar 

  18. Wenger, S.: H.264/AVC over IP. IEEE Trans. Circuits Syst. Video Technol. 13(7), 645–656 (2003)

    Google Scholar 

  19. Bachtiar, M., Wasista, S., Ditanaya, T.: Security enhancement of AES based encryption using dynamic salt algorithm. In: International Conference on Applied Engineering (ICAE). IEEE, Batam, Indonesia (2018)

    Google Scholar 

  20. Rao, M., Kaknjo, A., Omerdic, E.: An efficient high speed AES implementation using traditional FPGA and LabVIEW FPGA platforms. In: 10th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 93–100. IEEE, Zhengzhou, Peoples of China (2018)

    Google Scholar 

  21. Long, X., Wang, J., Zhao, G.: Forward security research of key management scheme in wireless sensor networks. Comput. Eng. Appl. 47(25), 68–70, 88, 136 (2011)

    Google Scholar 

  22. Ahmed, A.A., Ali, W.: A lightweight reliability mechanism proposed for datagram congestion control protocol over wireless multimedia sensor networks. Trans. Emerg. Telecommun. Technol. 29(3), 1–17 (2018)

    Google Scholar 

Download references

Acknowledgment

This work is supported by National Natural Science Foundation of China (No. 61876019 & U1636213).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lu Liu or Xiao Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Han, W., Wang, L., Liu, L., Yu, X. (2019). Encrypting VoLTE Communication via Baseband Firmware Extension. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics